Secure multi-party computation /:
Secure Multi-Party Computation (MPC) is one of the most powerful tools developed by modern cryptography: it facilitates collaboration among mutually distrusting parties by implementing a virtual trusted party. Despite the remarkable potential of such a tool, and decades of active research in the the...
Gespeichert in:
Körperschaft: | |
---|---|
Weitere Verfasser: | , |
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Amsterdam ; Washington :
IOS Press,
©2013.
|
Schriftenreihe: | Cryptology and information security series ;
v. 10. |
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | Secure Multi-Party Computation (MPC) is one of the most powerful tools developed by modern cryptography: it facilitates collaboration among mutually distrusting parties by implementing a virtual trusted party. Despite the remarkable potential of such a tool, and decades of active research in the theoretical cryptography community, it remains a relatively inaccessible and lesser-known concept outside of this field. Only a handful of resources are available to students and researchers wishing to learn more about MPC. The editors of this book have assembled a comprehensive body of basic and advanced material on MPC, authored by experts in the field. It will serve as a starting point for those interested in pursuing research related to MPC, whether they are students learning about it for the first time or researchers already working in the area. The book begins with tutorials introducing the concept of MPC and zero-knowledge proofs, an important theoretical platform where many of the concepts central to MPC were shaped. The remaining chapters deal with classical as well as recent MPC protocols, and a variety of related topics. Each chapter is self-contained and can be read independently of the others. |
Beschreibung: | Includes author index. |
Beschreibung: | 1 online resource |
Bibliographie: | Includes bibliographical references and index. |
ISBN: | 9781614991694 1614991693 1614991685 9781614991687 1299333397 9781299333390 |
Internformat
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocn828560992 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr cn||||||||| | ||
008 | 130226s2013 ne ob 001 0 eng d | ||
010 | |a 2012953955 | ||
040 | |a IOSPR |b eng |e pn |c IOSPR |d N$T |d EBLCP |d IDEBK |d YDXCP |d E7B |d OCLCF |d OCLCQ |d CDX |d DEBSZ |d OCLCQ |d OCLCO |d OCLCQ |d AZK |d AGLDB |d MOR |d CCO |d PIFPO |d MERUC |d OCLCQ |d ZCU |d U3W |d UUM |d STF |d WRM |d VTS |d NRAMU |d ICG |d INT |d VT2 |d REC |d OCLCQ |d WYU |d OCLCQ |d DKC |d OCLCQ |d M8D |d OCLCQ |d UKCRE |d AJS |d UKAHL |d OCLCQ |d OCLCO |d OCLCQ |d QGK |d OCLCO |d OCLCL |d SXB |d OCLCQ | ||
019 | |a 961656769 |a 962651172 |a 988533603 |a 991964330 |a 1037744777 |a 1038641914 |a 1045499486 |a 1055358936 |a 1066603530 |a 1081258946 |a 1153537666 |a 1228610001 |a 1259098321 | ||
020 | |a 9781614991694 |q (electronic bk.) | ||
020 | |a 1614991693 |q (electronic bk.) | ||
020 | |a 1614991685 | ||
020 | |a 9781614991687 | ||
020 | |z 9781614991687 | ||
020 | |a 1299333397 | ||
020 | |a 9781299333390 | ||
035 | |a (OCoLC)828560992 |z (OCoLC)961656769 |z (OCoLC)962651172 |z (OCoLC)988533603 |z (OCoLC)991964330 |z (OCoLC)1037744777 |z (OCoLC)1038641914 |z (OCoLC)1045499486 |z (OCoLC)1055358936 |z (OCoLC)1066603530 |z (OCoLC)1081258946 |z (OCoLC)1153537666 |z (OCoLC)1228610001 |z (OCoLC)1259098321 | ||
037 | |a 978-1-61499-169-4 |b IOS Press |n http://www.iospress.nl | ||
050 | 4 | |a QA76.9.A25 |b S43 2013 | |
072 | 7 | |a COM |x COM014000 |2 bisacsh | |
072 | 7 | |a COM |x 083000 |2 bisacsh | |
082 | 7 | |a 005.8/2 |2 23 | |
049 | |a MAIN | ||
245 | 0 | 0 | |a Secure multi-party computation / |c edited by Manoj M. Prabhakaran and Amit Sahai. |
260 | |a Amsterdam ; |a Washington : |b IOS Press, |c ©2013. | ||
300 | |a 1 online resource | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
490 | 1 | |a Cryptology and information security series ; |v v. 10 | |
500 | |a Includes author index. | ||
588 | 0 | |a Title page from PDF version; (IOS Press; viewed on Feb. 26, 2013). | |
504 | |a Includes bibliographical references and index. | ||
505 | 0 | |a Title Page -- Foreword -- Preface -- Contents -- General Cryptographic Protocols: The Very Basics -- A Short Tutorial of Zero-Knowledge -- Security and Composition of Cryptographic Protocols: A Tutorial -- The BGW Protocol for Perfectly-Secure Multiparty Computation -- Information-Theoretic Secure Multiparty Computation -- The IPS Compiler -- Randomization Techniques for Secure Computation -- Complexity of Multi-Party Computation Functionalities -- Author Index. | |
520 | |a Secure Multi-Party Computation (MPC) is one of the most powerful tools developed by modern cryptography: it facilitates collaboration among mutually distrusting parties by implementing a virtual trusted party. Despite the remarkable potential of such a tool, and decades of active research in the theoretical cryptography community, it remains a relatively inaccessible and lesser-known concept outside of this field. Only a handful of resources are available to students and researchers wishing to learn more about MPC. The editors of this book have assembled a comprehensive body of basic and advanced material on MPC, authored by experts in the field. It will serve as a starting point for those interested in pursuing research related to MPC, whether they are students learning about it for the first time or researchers already working in the area. The book begins with tutorials introducing the concept of MPC and zero-knowledge proofs, an important theoretical platform where many of the concepts central to MPC were shaped. The remaining chapters deal with classical as well as recent MPC protocols, and a variety of related topics. Each chapter is self-contained and can be read independently of the others. | ||
546 | |a English. | ||
650 | 0 | |a Data encryption (Computer science) |0 http://id.loc.gov/authorities/subjects/sh94001524 | |
650 | 6 | |a Chiffrement (Informatique) | |
650 | 7 | |a COMPUTERS |x Security |x Cryptography. |2 bisacsh | |
650 | 7 | |a Data encryption (Computer science) |2 fast | |
700 | 1 | |a Prabhakaran, Manoj, |d 1979- |1 https://id.oclc.org/worldcat/entity/E39PCjHqdxgCftqqVfJWJpF4mb |0 http://id.loc.gov/authorities/names/no2005091624 | |
700 | 1 | |a Sahai, Amit. | |
710 | 2 | |a IOS Press. |0 http://id.loc.gov/authorities/names/no2015091156 | |
758 | |i has work: |a Secure multi-party computation (Text) |1 https://id.oclc.org/worldcat/entity/E39PCGYXQCjYBWqyDQ647GkHcq |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |t Secure multi-party computation. |d Amsterdam ; Washington : IOS Press, ©2013 |w (DLC) 2012953955 |
830 | 0 | |a Cryptology and information security series ; |v v. 10. |0 http://id.loc.gov/authorities/names/no2008086431 | |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=544748 |3 Volltext |
938 | |a Askews and Holts Library Services |b ASKH |n AH37546020 | ||
938 | |a Coutts Information Services |b COUT |n 25073285 | ||
938 | |a EBL - Ebook Library |b EBLB |n EBL1137458 | ||
938 | |a ebrary |b EBRY |n ebr10667653 | ||
938 | |a EBSCOhost |b EBSC |n 544748 | ||
938 | |a ProQuest MyiLibrary Digital eBook Collection |b IDEB |n cis25073285 | ||
938 | |a YBP Library Services |b YANK |n 10251328 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocn828560992 |
---|---|
_version_ | 1816882223209512960 |
adam_text | |
any_adam_object | |
author2 | Prabhakaran, Manoj, 1979- Sahai, Amit |
author2_role | |
author2_variant | m p mp a s as |
author_GND | http://id.loc.gov/authorities/names/no2005091624 |
author_corporate | IOS Press |
author_corporate_role | |
author_facet | Prabhakaran, Manoj, 1979- Sahai, Amit IOS Press |
author_sort | Prabhakaran, Manoj, 1979- |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 S43 2013 |
callnumber-search | QA76.9.A25 S43 2013 |
callnumber-sort | QA 276.9 A25 S43 42013 |
callnumber-subject | QA - Mathematics |
collection | ZDB-4-EBA |
contents | Title Page -- Foreword -- Preface -- Contents -- General Cryptographic Protocols: The Very Basics -- A Short Tutorial of Zero-Knowledge -- Security and Composition of Cryptographic Protocols: A Tutorial -- The BGW Protocol for Perfectly-Secure Multiparty Computation -- Information-Theoretic Secure Multiparty Computation -- The IPS Compiler -- Randomization Techniques for Secure Computation -- Complexity of Multi-Party Computation Functionalities -- Author Index. |
ctrlnum | (OCoLC)828560992 |
dewey-full | 005.8/2 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8/2 |
dewey-search | 005.8/2 |
dewey-sort | 15.8 12 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05260cam a2200685 a 4500</leader><controlfield tag="001">ZDB-4-EBA-ocn828560992</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cn|||||||||</controlfield><controlfield tag="008">130226s2013 ne ob 001 0 eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a"> 2012953955</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">IOSPR</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">IOSPR</subfield><subfield code="d">N$T</subfield><subfield code="d">EBLCP</subfield><subfield code="d">IDEBK</subfield><subfield code="d">YDXCP</subfield><subfield code="d">E7B</subfield><subfield code="d">OCLCF</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">CDX</subfield><subfield code="d">DEBSZ</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">AZK</subfield><subfield code="d">AGLDB</subfield><subfield code="d">MOR</subfield><subfield code="d">CCO</subfield><subfield code="d">PIFPO</subfield><subfield code="d">MERUC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">ZCU</subfield><subfield code="d">U3W</subfield><subfield code="d">UUM</subfield><subfield code="d">STF</subfield><subfield code="d">WRM</subfield><subfield code="d">VTS</subfield><subfield code="d">NRAMU</subfield><subfield code="d">ICG</subfield><subfield code="d">INT</subfield><subfield code="d">VT2</subfield><subfield code="d">REC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">WYU</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">DKC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">M8D</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">UKCRE</subfield><subfield code="d">AJS</subfield><subfield code="d">UKAHL</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">QGK</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield><subfield code="d">SXB</subfield><subfield code="d">OCLCQ</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">961656769</subfield><subfield code="a">962651172</subfield><subfield code="a">988533603</subfield><subfield code="a">991964330</subfield><subfield code="a">1037744777</subfield><subfield code="a">1038641914</subfield><subfield code="a">1045499486</subfield><subfield code="a">1055358936</subfield><subfield code="a">1066603530</subfield><subfield code="a">1081258946</subfield><subfield code="a">1153537666</subfield><subfield code="a">1228610001</subfield><subfield code="a">1259098321</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781614991694</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1614991693</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1614991685</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781614991687</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781614991687</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1299333397</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781299333390</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)828560992</subfield><subfield code="z">(OCoLC)961656769</subfield><subfield code="z">(OCoLC)962651172</subfield><subfield code="z">(OCoLC)988533603</subfield><subfield code="z">(OCoLC)991964330</subfield><subfield code="z">(OCoLC)1037744777</subfield><subfield code="z">(OCoLC)1038641914</subfield><subfield code="z">(OCoLC)1045499486</subfield><subfield code="z">(OCoLC)1055358936</subfield><subfield code="z">(OCoLC)1066603530</subfield><subfield code="z">(OCoLC)1081258946</subfield><subfield code="z">(OCoLC)1153537666</subfield><subfield code="z">(OCoLC)1228610001</subfield><subfield code="z">(OCoLC)1259098321</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">978-1-61499-169-4</subfield><subfield code="b">IOS Press</subfield><subfield code="n">http://www.iospress.nl</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.A25</subfield><subfield code="b">S43 2013</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">COM014000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">083000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8/2</subfield><subfield code="2">23</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Secure multi-party computation /</subfield><subfield code="c">edited by Manoj M. Prabhakaran and Amit Sahai.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Amsterdam ;</subfield><subfield code="a">Washington :</subfield><subfield code="b">IOS Press,</subfield><subfield code="c">©2013.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Cryptology and information security series ;</subfield><subfield code="v">v. 10</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes author index.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Title page from PDF version; (IOS Press; viewed on Feb. 26, 2013).</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Title Page -- Foreword -- Preface -- Contents -- General Cryptographic Protocols: The Very Basics -- A Short Tutorial of Zero-Knowledge -- Security and Composition of Cryptographic Protocols: A Tutorial -- The BGW Protocol for Perfectly-Secure Multiparty Computation -- Information-Theoretic Secure Multiparty Computation -- The IPS Compiler -- Randomization Techniques for Secure Computation -- Complexity of Multi-Party Computation Functionalities -- Author Index.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Secure Multi-Party Computation (MPC) is one of the most powerful tools developed by modern cryptography: it facilitates collaboration among mutually distrusting parties by implementing a virtual trusted party. Despite the remarkable potential of such a tool, and decades of active research in the theoretical cryptography community, it remains a relatively inaccessible and lesser-known concept outside of this field. Only a handful of resources are available to students and researchers wishing to learn more about MPC. The editors of this book have assembled a comprehensive body of basic and advanced material on MPC, authored by experts in the field. It will serve as a starting point for those interested in pursuing research related to MPC, whether they are students learning about it for the first time or researchers already working in the area. The book begins with tutorials introducing the concept of MPC and zero-knowledge proofs, an important theoretical platform where many of the concepts central to MPC were shaped. The remaining chapters deal with classical as well as recent MPC protocols, and a variety of related topics. Each chapter is self-contained and can be read independently of the others.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Data encryption (Computer science)</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh94001524</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Chiffrement (Informatique)</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Security</subfield><subfield code="x">Cryptography.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Data encryption (Computer science)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Prabhakaran, Manoj,</subfield><subfield code="d">1979-</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCjHqdxgCftqqVfJWJpF4mb</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2005091624</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Sahai, Amit.</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">IOS Press.</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2015091156</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">Secure multi-party computation (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCGYXQCjYBWqyDQ647GkHcq</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="t">Secure multi-party computation.</subfield><subfield code="d">Amsterdam ; Washington : IOS Press, ©2013</subfield><subfield code="w">(DLC) 2012953955</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Cryptology and information security series ;</subfield><subfield code="v">v. 10.</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2008086431</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=544748</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Askews and Holts Library Services</subfield><subfield code="b">ASKH</subfield><subfield code="n">AH37546020</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Coutts Information Services</subfield><subfield code="b">COUT</subfield><subfield code="n">25073285</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBL - Ebook Library</subfield><subfield code="b">EBLB</subfield><subfield code="n">EBL1137458</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ebrary</subfield><subfield code="b">EBRY</subfield><subfield code="n">ebr10667653</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">544748</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ProQuest MyiLibrary Digital eBook Collection</subfield><subfield code="b">IDEB</subfield><subfield code="n">cis25073285</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">10251328</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBA-ocn828560992 |
illustrated | Not Illustrated |
indexdate | 2024-11-27T13:25:12Z |
institution | BVB |
institution_GND | http://id.loc.gov/authorities/names/no2015091156 |
isbn | 9781614991694 1614991693 1614991685 9781614991687 1299333397 9781299333390 |
language | English |
lccn | 2012953955 |
oclc_num | 828560992 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource |
psigel | ZDB-4-EBA |
publishDate | 2013 |
publishDateSearch | 2013 |
publishDateSort | 2013 |
publisher | IOS Press, |
record_format | marc |
series | Cryptology and information security series ; |
series2 | Cryptology and information security series ; |
spelling | Secure multi-party computation / edited by Manoj M. Prabhakaran and Amit Sahai. Amsterdam ; Washington : IOS Press, ©2013. 1 online resource text txt rdacontent computer c rdamedia online resource cr rdacarrier Cryptology and information security series ; v. 10 Includes author index. Title page from PDF version; (IOS Press; viewed on Feb. 26, 2013). Includes bibliographical references and index. Title Page -- Foreword -- Preface -- Contents -- General Cryptographic Protocols: The Very Basics -- A Short Tutorial of Zero-Knowledge -- Security and Composition of Cryptographic Protocols: A Tutorial -- The BGW Protocol for Perfectly-Secure Multiparty Computation -- Information-Theoretic Secure Multiparty Computation -- The IPS Compiler -- Randomization Techniques for Secure Computation -- Complexity of Multi-Party Computation Functionalities -- Author Index. Secure Multi-Party Computation (MPC) is one of the most powerful tools developed by modern cryptography: it facilitates collaboration among mutually distrusting parties by implementing a virtual trusted party. Despite the remarkable potential of such a tool, and decades of active research in the theoretical cryptography community, it remains a relatively inaccessible and lesser-known concept outside of this field. Only a handful of resources are available to students and researchers wishing to learn more about MPC. The editors of this book have assembled a comprehensive body of basic and advanced material on MPC, authored by experts in the field. It will serve as a starting point for those interested in pursuing research related to MPC, whether they are students learning about it for the first time or researchers already working in the area. The book begins with tutorials introducing the concept of MPC and zero-knowledge proofs, an important theoretical platform where many of the concepts central to MPC were shaped. The remaining chapters deal with classical as well as recent MPC protocols, and a variety of related topics. Each chapter is self-contained and can be read independently of the others. English. Data encryption (Computer science) http://id.loc.gov/authorities/subjects/sh94001524 Chiffrement (Informatique) COMPUTERS Security Cryptography. bisacsh Data encryption (Computer science) fast Prabhakaran, Manoj, 1979- https://id.oclc.org/worldcat/entity/E39PCjHqdxgCftqqVfJWJpF4mb http://id.loc.gov/authorities/names/no2005091624 Sahai, Amit. IOS Press. http://id.loc.gov/authorities/names/no2015091156 has work: Secure multi-party computation (Text) https://id.oclc.org/worldcat/entity/E39PCGYXQCjYBWqyDQ647GkHcq https://id.oclc.org/worldcat/ontology/hasWork Print version: Secure multi-party computation. Amsterdam ; Washington : IOS Press, ©2013 (DLC) 2012953955 Cryptology and information security series ; v. 10. http://id.loc.gov/authorities/names/no2008086431 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=544748 Volltext |
spellingShingle | Secure multi-party computation / Cryptology and information security series ; Title Page -- Foreword -- Preface -- Contents -- General Cryptographic Protocols: The Very Basics -- A Short Tutorial of Zero-Knowledge -- Security and Composition of Cryptographic Protocols: A Tutorial -- The BGW Protocol for Perfectly-Secure Multiparty Computation -- Information-Theoretic Secure Multiparty Computation -- The IPS Compiler -- Randomization Techniques for Secure Computation -- Complexity of Multi-Party Computation Functionalities -- Author Index. Data encryption (Computer science) http://id.loc.gov/authorities/subjects/sh94001524 Chiffrement (Informatique) COMPUTERS Security Cryptography. bisacsh Data encryption (Computer science) fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh94001524 |
title | Secure multi-party computation / |
title_auth | Secure multi-party computation / |
title_exact_search | Secure multi-party computation / |
title_full | Secure multi-party computation / edited by Manoj M. Prabhakaran and Amit Sahai. |
title_fullStr | Secure multi-party computation / edited by Manoj M. Prabhakaran and Amit Sahai. |
title_full_unstemmed | Secure multi-party computation / edited by Manoj M. Prabhakaran and Amit Sahai. |
title_short | Secure multi-party computation / |
title_sort | secure multi party computation |
topic | Data encryption (Computer science) http://id.loc.gov/authorities/subjects/sh94001524 Chiffrement (Informatique) COMPUTERS Security Cryptography. bisacsh Data encryption (Computer science) fast |
topic_facet | Data encryption (Computer science) Chiffrement (Informatique) COMPUTERS Security Cryptography. |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=544748 |
work_keys_str_mv | AT prabhakaranmanoj securemultipartycomputation AT sahaiamit securemultipartycomputation AT iospress securemultipartycomputation |